Analysis of Internet Topologies
|
|
|
- Heather Thomas
- 10 years ago
- Views:
Transcription
1 Analysis of Internet Topologies Ljiljana Trajković Communication Networks Laboratory School of Engineering Science Simon Fraser University, Vancouver, British Columbia Canada
2 Roadmap Internet topology and the datasets Spectrum of a graph and power-laws Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 2
3 Roadmap Internet topology and the datasets Spectrum of a graph and power-laws Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 3
4 lhr (535,102 nodes and 601,678 links) CAS Society: DLP talk 4
5 Internet graph Internet is a network of Autonomous Systems: groups of networks sharing the same routing policy identified with Autonomous System Numbers (ASN) Autonomous System Numbers: Internet topology on AS-level: the arrangement of ASes and their interconnections Analyzing the Internet topology and finding properties of associated graphs rely on mining data and capturing information about Autonomous Systems (ASes) CAS Society: DLP talk 5
6 Internet routing protocol Border Gateway Protocol (BGP): inter-as protocol used to exchange network reachability information among BGP systems reachability information is stored in routing tables CAS Society: DLP talk 6
7 Internet AS-level data Source of data are routing tables: Route Views: most participating ASes reside in North America RIPE (Réseaux IP européens): most participating ASes reside in Europe The BGP routing tables are collected from multiple geographically distributed BGP Cisco routers and Zebra servers. Analyzed datasets were collected at 00:00 am on July 31, 2003 and 00:00 am on July 31, CAS Society: DLP talk 7
8 Internet AS-level data Data used in prior research (partial list): Faloutsos, 1999 Chang, 2001 Vukadinovic, 2001 Gkantsidis, 2003 Route Views Yes Yes Yes Yes RIPE No Yes No Yes These research results have been used in developing Internet simulation tools: power-laws are employed to model and generate Internet topologies: BA model, BRITE, Inet CAS Society: DLP talk 8
9 Data sets Concerns about the use of the two datasets: different observations about AS degrees: power-law distribution: Route Views [Faloutsos, 1999] Weibull distribution: Route Views + RIPE [Chang, 2001] data completeness: RIPE dataset contains ~ 40% more AS connections and 2% more ASs than Route Views [Chang, 2001] CAS Society: DLP talk 9
10 Route Views and RIPE: statistics Route Views and RIPE samples collected on May 30, 2003 Number of AS paths Probed ASs AS pairs Route Views 6,398,912 15,418 34,878 RIPE 6,375,028 15,433 35,225 AS pair: a pair of connected ASs 15,369 probed ASs (99.7%) in both datasets are identical 29,477 AS pairs in Route Views (85%) and in RIPE (84%) are identical CAS Society: DLP talk 10
11 Degree distributions: 2003 data Consider all ASs with assigned AS numbers AS degree distribution in Route Views and RIPE datasets: CAS Society: DLP talk 11
12 Route Views RIPE Core ASs ASs with largest degrees AS Degree AS Degree CAS Society: DLP talk 12
13 Route Views RIPE AS Degree AS Degree Core ASs ASs with largest degrees 16 of the core ASs in Route Views and RIPE are identical Core ASs in Route Views have larger degrees than core ASs in RIPE CAS Society: DLP talk 13
14 Internet topology Datasets are collected from Border Gateway Protocols (BGP) routing tables. The Internet topology is characterized by the presence of various power-laws observed when considering: node degree vs. node rank node degree frequency vs. degree number of nodes within a number of hops vs. number of hops eigenvalues of the adjacency matrix and the normalized Laplacian matrix vs. the order of the eigenvalues Faloutsos et al., 1999 and Siganos et al., CAS Society: DLP talk 14
15 Roadmap Internet topology and the datasets Power-laws and spectrum of a graph Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 15
16 Spectrum of a graph Normalized Laplacian matrix NL(G): NL( i, 1 j) = 0 1 d d i j 0 d i and d j are degrees of node i and j, respectively The spectrum of NL(G) is the collection of all eigenvalues and contains 0 for every connected graph component. if if i = i and j and d otherwise i j are adjacent Chung et al., CAS Society: DLP talk 16
17 Power laws: node degree vs. rank The graph nodes v are sorted in decreasing order based on their degrees d v and are indexed with a sequence of numbers indicating their ranks r v. The (r v, d v ) pairs are plotted on the log-log scale. The power-law implies: d R v r v where v is the node number and R is the node degree powerlaw exponent., CAS Society: DLP talk 17
18 Power laws: CCDF of a node degree The frequency of a node degree is equal to the number of nodes having the same degree. The complementary cumulative distribution function (CCDF) D d of a node degree d is equal to the number of nodes having degree less than or equal to d, divided by the number of nodes. The power-law implies: D, D where D is the CCDF power-law exponent. d d CAS Society: DLP talk 18
19 Power laws: eigenvalues The eigenvalues λ i of the adjacency matrix and the normalized Laplacian matrix are sorted in decreasing order and plotted versus the associated increasing sequence of numbers i representing the order of the eigenvalue. The power-law for the adjacency matrix implies: λ ai i ε, The power-law for the normalized Laplacian matrix implies: λ Li where ε and L are the eigenvalue power-law exponents. i L, CAS Society: DLP talk 19
20 Analysis of datasets Calculated and plotted on a log-log scale are: node degree vs. node rank frequency of node degree vs. node degree eigenvalues vs. index Linear regression is used to determine the correlation coefficient between the regression line and the plotted data. A high correlation coefficient between the regression line and the plotted data indicates the existence of a power-law, which implies that node degree, frequency of node degree, and eigenvalues follow a power-law dependency on the rank, node degree, and index, respectively CAS Society: DLP talk 20
21 Analysis of datasets The power-law exponents are calculated from the linear regression lines 10 a x b, with segment a and slope b when plotted on a log-log scale. Source of data are routing tables: Route Views: RIPE (Réseaux IP européens): Faloutsos et al., 1999 and Chen et al., CAS Society: DLP talk 21
22 Roadmap Internet topology and the datasets Spectrum of a graph and power-laws Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 22
23 Route Views 2003 dataset The node degree power-law exponent R = The correlation coefficient = CAS Society: DLP talk 23
24 Route Views 2008 dataset The node degree power-law exponent R = The correlation coefficient = CAS Society: DLP talk 24
25 Confidence intervals: node degree CAS Society: DLP talk 25
26 Confidence intervals Six samples were randomly selected from 2003 and 2008 Route Views and RIPE datasets Each dataset is smaller than 30, with unknown standard deviation T-distribution was used to predict the confidence interval at 95% confidence level X t / 2( s / n ) < μ < X tx / 2( s / n ) x + t x / X : the sample mean 2 : the t-distribution s : sample standard deviation n : number of samples μ : population mean CAS Society: DLP talk 26
27 Route Views 2003 dataset CCDF power-law exponent D = The correlation coefficient = CAS Society: DLP talk 27
28 Route Views 2008 dataset CCDF power-law exponents D = The correlation coefficients = CAS Society: DLP talk 28
29 Confidence intervals: CCDF CAS Society: DLP talk 29
30 Route Views 2003 dataset The eigenvalue power-law exponents ε = The correlation coefficient = CAS Society: DLP talk 30
31 Route Views 2008 dataset The eigenvalue power-law exponent ε = The correlation coefficient = CAS Society: DLP talk 31
32 Confidence intervals: adjacency matrix CAS Society: DLP talk 32
33 Route Views 2003 dataset The eigenvalue power-law exponent L = The correlation coefficient = CAS Society: DLP talk 33
34 Route Views 2008 dataset The eigenvalue power-law exponent L = The correlation coefficient = CAS Society: DLP talk 34
35 Confidence intervals: normalized Laplacian matrix CAS Society: DLP talk 35
36 Roadmap Internet topology and the datasets Spectrum of a graph and power-laws Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 36
37 Spectral analysis of Internet graphs We calculate the second smallest and the largest eigenvalues and associated eigenvectors of normalized Laplacian matrix. Each element of an eigenvector is associated with the AS having the same index. ASes are sorted in the ascending order based on the eigenvector values and the sorted AS vector is then indexed. The connectivity status is equal to one if the AS is connected to another AS or zero if the AS is isolated or is absent from the routing table CAS Society: DLP talk 37
38 Spectral analysis of Internet graphs The second smallest eigenvalue, called "algebraic connectivity" of a normalized Laplacian matrix, is related to the connectivity characteristic of the graph. Elements of the eigenvector corresponding to the largest eigenvalue of the normalized Laplacian matrix tend to be positioned close to each other if they correspond to AS nodes with similar connectivity patterns constituting clusters. Gkantsidis et al., CAS Society: DLP talk 38
39 Characteristic valuation: example The second smallest eigenvector: 0.1, 0.3, -0.2, 0 AS1(0.1), AS2(0.3), AS3(-0.2), AS4(0) Sort ASs by element value: AS3, AS4, AS1, AS2 AS3 and AS1 are connected connectivity status 1 0 AS3 AS4 AS1 AS2 index of elements CAS Society: DLP talk 39
40 Spectral analysis: observations The second smallest eigenvector: separates connected ASs from disconnected ASs Route Views and RIPE datasets are similar on a coarser scale The largest eigenvector: reveals highly connected clusters Route Views and RIPE datasets differ on a finer scale CAS Society: DLP talk 40
41 Route Views 2003 dataset Spectral views of the AS connectivity based on the second smallest eigenvalue CAS Society: DLP talk 41
42 Route Views 2008 dataset Spectral views of the AS connectivity based on the second smallest eigenvalue CAS Society: DLP talk 42
43 Route Views 2003 dataset Spectral views of the AS connectivity based on the largest eigenvalue CAS Society: DLP talk 43
44 Route Views 2008 dataset Spectral views of the AS connectivity based on the largest eigenvalue CAS Society: DLP talk 44
45 Roadmap Internet topology and the datasets Spectrum of a graph and power-laws Power-laws and the Internet topology Spectral analysis of the Internet graph Conclusions and references CAS Society: DLP talk 45
46 Conclusions We have evaluated collected data from the Route Views and RIPE projects and have confirmed the presence of power-laws in graphs capturing the AS-level Internet topology. Spectral analysis techniques revealed distinct clustering characteristics of Route Views and RIPE datasets The analysis also captured historical trends in the development of the Internet topology over the past five years. In spite of the Internet growth, increasing number of users, and the deployment of new network elements, powerlaw exponents have not changed substantially CAS Society: DLP talk 46
47 Conclusions These power-law exponents do not capture every property of a graph and are only one measure used to characterize the Internet. However, spectral analysis based on the normalized Laplacian matrix indicated visible changes in the clustering of AS nodes and the AS connectivity CAS Society: DLP talk 47
48 References M. Najiminaini, L. Subedi, and Lj. Trajkovic, "Analysis of Internet topologies: a historical view," presented at IEEE International Symposium Circuits and Systems, Taipei, Taiwan, May J. Chen and Lj. Trajkovic, "Analysis of Internet topology data," Proc. IEEE International Symposium on Circuits and Systems, Vancouver, BC, Canada, May 2004, vol. IV, pp M. Faloutsos, P. Faloutsos, and C. Faloutsos, On power-law relationships of the Internet topology, Proc. ACM SIGCOMM, Computer Communication Review, vol. 29, no. 4, pp , Sept G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos, "Power-laws and the AS-level Internet topology," IEEE/ACM Trans. Networking, vol. 11, no. 4, pp , Aug A. Medina, I. Matta, and J. Byers, "On the origin of power laws in Internet topologies," Proc. ACM SIGCOMM 2000, Computer Communication Review, vol. 30, no. 2, pp , Apr CAS Society: DLP talk 48
49 References L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans. Networking, vol. 9, no. 6, pp , Dec D. Vukadinovic, P. Huang, and T. Erlebach, On the Spectrum and Structure of Internet Topology Graphs, in H. Unger et al., editors, Innovative Internet Computing Systems, LNCS2346, pp Springer, Berlin, Germany, Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "The origin of power laws in Internet topologies revisited," Proc. INFOCOM, New York, NY, USA, Apr. 2002, pp H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Towards capturing representative AS-level Internet topologies," Proc. of ACM SIGMETRICS 2002, New York, NY, June 2002, pp H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Network topology generators: degree-based vs. structural," Proc. ACM SIGCOMM, Computer Communication Review, vol. 32, no. 4, pp , Oct CAS Society: DLP talk 49
50 References C. Gkantsidis, M. Mihail, and E. Zegura, "Spectral analysis of Internet topologies, Proc. of Infocom 2003, San Francisco, CA, Mar. 2003, vol. 1, pp S. Jaiswal, A. Rosenberg, and D. Towsley, "Comparing the structure of power-law graphs and the Internet AS graph," Proc. 12th IEEE International Conference on Network Protocols, Washington DC, Aug. 2004, pp F. R. K. Chung, Spectral Graph Theory. Providence, Rhode Island: Conference Board of the Mathematical Sciences, 1997, pp M. Fiedler, "Algebraic connectivity of graphs," Czech. Math. J., vol. 23, no. 2, pp , CAS Society: DLP talk 50
51 lhr (535,102 nodes and 601,678 links) CAS Society: DLP talk 51
52 lhr (535,102 nodes and 601,678 links) CAS Society: DLP talk 52
53 lhr (535,102 nodes and 601,678 links) CAS Society: DLP talk 53
54 Round-trip time measurements (63,631 nodes and 63,630 links) CAS Society: DLP talk 54
55 Round-trip time measurements (63,631 nodes and 63,630 links) CAS Society: DLP talk 55
56 Resources CAIDA: The Cooperative Association for Internet Data Analysis Walrus - Gallery: Visualization & Navigation Walrus - Gallery: Abstract Art CAS Society: DLP talk 56
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Inet-3.0: Internet Topology Generator
Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin {jwinick,jamin}@eecs.umich.edu CSE-TR-456-2 Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet
The Internet Is Like A Jellyfish
The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,
Internet Topology. Yihua He [email protected] Michalis Faloutsos [email protected]. University of California, Riverside. Glossary 2.
Internet Topology Yihua He [email protected] Michalis Faloutsos [email protected] Georgos Siganos [email protected] University of California, Riverside Contents Glossary 2 1 Definition 2 2 Introduction
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Some Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
AN INITIAL PEER CONFIGURATION ALGORITHM
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishii and Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
Mining Network Traffic Data
Mining Network Traffic Data Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British Columbia
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
BGP Routing Stability of Popular Destinations
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
An Overview of Solutions to Avoid Persistent BGP Divergence
An Overview of Solutions to Avoid Persistent BGP Divergence Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Email: musunuri, cobb @utdallas.edu Abstract The
On Routing Asymmetry in the Internet
On Routing Asymmetry in the Internet Yihua He Michalis Faloutsos Srikanth Krishnamurthy Bradley Huffaker [email protected] [email protected] [email protected] [email protected] Department of Computer Science
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Graph Mining Techniques for Social Media Analysis
Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
Jellyfish: A Conceptual Model for the AS Internet Topology
Jellyfish: A Conceptual Model for the AS Internet Topology Georgos Siganos U. C. Riverside [email protected] Sudhir L. Tauro U. C. Riverside [email protected] Michalis Faloutsos U. C. Riverside [email protected]
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Traceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Richardson, TX-75083-0688 Email:
BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.
BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Anonym: A Tool for Anonymization of the Internet Traffic
Anonym: A Tool for Anonymization of the Internet Traffic Tanjila Farah and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada {tfarah, ljilja}@sfu.ca Abstract Collecting network
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Richardson, TX-75083-0688 Email:
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY
EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large
Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
Search Heuristics for Load Balancing in IP-networks
Search Heuristics for Load Balancing in IP-networks Mattias Söderqvist Swedish Institute of Computer Science [email protected] 3rd March 25 SICS Technical Report T25:4 ISSN 11-3154 ISRN:SICS-T--25/4-SE Abstract
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Algorithms and Tools for Anonymization of the Internet Traffic
Algorithms and Tools for Anonymization of the Internet Traffic Tanjila Farah [email protected] Communication Networks Laboratory School of Engineering Science Simon Fraser University Roadmap Introduction Collection
Algorithms for representing network centrality, groups and density and clustered graph representation
COSIN IST 2001 33555 COevolution and Self-organization In dynamical Networks Algorithms for representing network centrality, groups and density and clustered graph representation Deliverable Number: D06
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
NETZCOPE - a tool to analyze and display complex R&D collaboration networks
The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks Khaled Alutaibi and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail: {kalutaib, ljilja}@sfu.ca Abstract
ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network
ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network Group No. 1 Chang, Zheng (Matt) [email protected] Tao, Yigang (Yi Gang) [email protected] Wen, Haoxian (Colman) [email protected]
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar [email protected] Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.
Distance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Tracers Placement for IP Traceback against DDoS Attacks
Tracers Placement for IP Traceback against DDoS Attacks Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-Min Yu, Wen Ouyang, Ching-Hsien Hsu, and Yu-Guang Chen Department of Computer Science and Information
Characterization and Design of Effective BGP AS-PATH Prepending
Characterization and Design of Effective BGP AS-PATH Prepending Ying Zhang, Mallik Tatipamula Ericsson Research Abstract The AS path prepending approach in BGP is commonly used to perform inter-domain
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
